Meiko Jensen

According to our database1, Meiko Jensen authored at least 55 papers between 2007 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
CampusTracer: A Privacy-Aware Contact Tracing Protocol for Campus Environments.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

A Generic Data Model for Implementing Right of Access Requests.
Proceedings of the Privacy Technologies and Policy - 10th Annual Privacy Forum, 2022

2019
Towards Aligning GDPR Compliance with Software Development: A Research Agenda.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Zur Messbarkeit von Schutzzielen.
Datenschutz und Datensicherheit, 2018

Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2016
Datenschutz im Fahrzeug der Zukunft: Vernetzt, Autonom, Elektrisch.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016

2015
Applying the protection goals for privacy engineering to mobile devices.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Protection Goals for Privacy Engineering.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Privacy-Preserving Detection of Plagiarism in Scientific Documents.
Proceedings of the 2015 IEEE World Congress on Services, 2015

IEEE Services Visionary Track on Security and Privacy Engineering (SPE 2015).
Proceedings of the 2015 IEEE World Congress on Services, 2015

Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Towards Measuring Maturity of Privacy-Enhancing Technologies.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

2014
4th IEEE 2014 Services Workshop on Security and Privacy Engineering - Message from the SPE 2014 Workshop Chairs.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Aligning User Consent Management and Service Process Modeling.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

2013
Security and Privacy-Enhancing Multicloud Architectures.
IEEE Trans. Dependable Secur. Comput., 2013

Secure Combination of XML Signature Application with Message Aggregation in Multicast Settings.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Wasch mich, aber mach mich nicht nass - Anonymisierungsverfahren als Schlüssel zur datenschutzkonformen E-Mail-Filterung.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

Towards Privacy-Friendly Transparency Services in Inter-organizational Business Processes.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Challenges of Privacy Protection in Big Data Analytics.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
XML Signature Wrapping Angriffe wirksam unterbinden.
Datenschutz und Datensicherheit, 2012

On Breaking SAML: Be Whoever You Want to Be.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Making XML Signatures Immune to XML Signature Wrapping Attacks.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

XSpRES - Robust and Effective XML Signatures for Web Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
Analysis of attacks and defenses in the context of web services.
PhD thesis, 2011

Server-Side Streaming Processing of WS-Security.
IEEE Trans. Serv. Comput., 2011

Sicherheitsprobleme im Cloud Computing.
Prax. Inf.verarb. Kommun., 2011

On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security.
Int. J. Mob. Comput. Multim. Commun., 2011

Towards Privacy-Preserving XML Transformation.
Proceedings of the IEEE International Conference on Web Services, 2011

Expressiveness Considerations of XML Signatures.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

All your clouds are belong to us: security analysis of cloud management interfaces.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

Crouching tiger - hidden payload: security risks of scalable vectors graphics.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Security Prospects through Cloud Computing by Adopting Multiple Clouds.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Streaming-Based Verification of XML Signatures in SOAP Messages.
Proceedings of the 6th World Congress on Services, 2010

Towards Automated Processing of the Right of Access in Inter-organizational Web Service Compositions.
Proceedings of the 6th World Congress on Services, 2010

Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

Attack Surfaces: A Taxonomy for Attacks on Cloud Services.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

Secure Bindings of SAML Assertions to TLS Sessions.
Proceedings of the ARES 2010, 2010

A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages.
Proceedings of the ARES 2010, 2010

2009
A survey of attacks on web services.
Comput. Sci. Res. Dev., 2009

XML Signature Wrapping Angriffe - What you process is not always what you verify.
Datenschutz und Datensicherheit, 2009

The curse of namespaces in the domain of XML signature.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009

Extending the similarity-based XML multicast approach with digital signatures.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009

Analysis of Signature Wrapping Attacks and Countermeasures.
Proceedings of the IEEE International Conference on Web Services, 2009

A Security Modeling Approach for Web-Service-Based Business Processes.
Proceedings of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2009

Privacy Against the Business Partner: Issues for Realizing End-to-End Confidentiality in Web Service Compositions.
Proceedings of the Database and Expert Systems Applications, 2009

Generating WS-SecurityPolicy Documents via Security Model Transformation.
Proceedings of the Business Process, 2009

On Technical Security Issues in Cloud Computing.
Proceedings of the IEEE International Conference on Cloud Computing, 2009

The Accountability Problem of Flooding Attacks in Service-Oriented Architectures.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Proceedings of the Workshop on Security for Web Services and Service-Oriented Architectures.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008

Flooding Attack Issues of Web Services and Service-Oriented Architectures.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008

A Fault Propagation Approach for Highly Distributed Service Compositions.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

The Impact of Flooding Attacks on Network-based Services.
Proceedings of the The Third International Conference on Availability, 2008

2007
Event-based application of ws-security policy on soap messages.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

A Stateful Web Service Firewall for BPEL.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

SOA and Web Services: New Technologies, New Standards - New Attacks.
Proceedings of the Fifth IEEE European Conference on Web Services (ECOWS 2007), 2007


  Loading...